| With the rapid development of edge computing on the Industrial Internet,data sharing solutions for edge users between multiple server domains require cross-domain authentication and key agreement to ensure reliable and secure communication.In a group-oriented data sharing scenario,the members of the group need a reliable shared key as a way to protect the security of data sharing.In a real-world network environment,there are three issues facing the security of keys.Firstly,traditional centralized key agreement in the cloud is vulnerable to attacks by third party users and does not provide reliable security;secondly,an inefficient process during group key agreement can lead to data sharing schemes not being completed in a timely manner;and thirdly,if privacy is not properly protected,it can lead to data leakage,thus compromising data security.Therefore,for sharing user data in an edge computing environment,it is crucial to investigate reliable authentication-based group key agreement protocols.The main work of this thesis is as follows:(1)Analyze the problems in the centralized key agreement of the Lee’s scheme,and construct a multidimensional virtual iteration-based group key agreement model based on the protocol analysis combined with the virtual iteration function.The protocol is also used as an example of a four-dimensional network graph for security analysis and performance evaluation.It is demonstrated that the protocol is decentralization,man-in-the-middle attack-proof and eavesdropping-proof,while having low computational overhead and low communication consumption.(2)The authentication-based user data sharing scheme in the edge computing environment is designed according to the model to achieve cross-domain authentication and key agreement for edge users,and the calculated key enables legitimate users in the group to share data with mutual trust.The scheme is described in detail,including the initialization operation,user and exotic server authentication,inter-user signature and key agreement phases,and finally the key update process in both cases.(3)This section provides a safety analysis and performance analysis of the proposed scheme,proving that the scheme proposed in this paper has certain advantages in terms of safety and efficiency.In cross-domain communication in industrial edge computing environments,where there are often problems of high data volumes and low security,this solution has good utility and application scope for such platforms. |